UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 9 Issue 3
March-2022
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2203609


Registration ID:
321892

Page Number

g42-g47

Share This Article


Jetir RMS

Title

A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks

Authors

Abstract

Wireless Sensor Networks (WSN) is one of the main zone of research and it has been more well known in the real life difficulties by giving minimal effort arrangements. The system comprises of little sensor nodes capable for detecting, handling, computation and communication. The system comprises of various sorts of assault, the most harming assault is sinkhole assault. In this kind of assault, the sinkhole node tries to draw in information to itself by transmitting counterfeit data to neighbor nodes and henceforth it interferes with the usefulness of such systems. Thusly with a specific end goal to overcome from this sort of assault giving security is critical. In this paper we are proposing sink and also source area protection systems. With a specific end goal to give more protection these procedures like privacy protection scheme and Hidden Markov Model (Base station location anonymity and security technique) is utilized. On account of forward random walk conspire requires every node to acquire its hop count to the sink, which can be accomplished by utilizing a sink-based flooding. Toward the starting, the sink will start a flooding, after which every node can get the both its neighbors hop count to the sink. On account of PPS conspire the center thought is to change the transmission scope of an arrangement of some chose sensors around the base to befuddle the assailant. Through this procedure, we can make an arrangement of fake base stations which can't be recognized by a solid assailant. The simulation results demonstrate that the proposed PSLP scheme improves the safety time without compromising the energy consumption.

Key Words

Wireless Sensor Networks, Privacy Protection Scheme, Hidden Marko Mode

Cite This Article

"A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.9, Issue 3, page no.g42-g47, March-2022, Available :http://www.jetir.org/papers/JETIR2203609.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.9, Issue 3, page no. ppg42-g47, March-2022, Available at : http://www.jetir.org/papers/JETIR2203609.pdf

Publication Details

Published Paper ID: JETIR2203609
Registration ID: 321892
Published In: Volume 9 | Issue 3 | Year March-2022
DOI (Digital Object Identifier):
Page No: g42-g47
Country: , , .
Area:
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000331

Print This Page

Current Call For Paper

Jetir RMS